Home > Articles > Security > General Security and Privacy
General Security and Privacy
178 Items
Sort by Date | Title
- Software [In]security: How to p0wn a Control System with Stuxnet
- Sep 23, 2010
- Gary McGraw describes the Stuxnet worm and explains some of its potentially dangerous implications.
|
- Software [In]security: Software Security Crosses the Threshold
- Aug 16, 2010
- The software security space exceeded the $500 million mark in 2009. Software security expert Gary McGraw examines the sales of security tools providers and services firms to find out how quickly the market is growing, and which parts of the market are driving growth.
|
- Software [In]security: Obama Highlights Cyber Security Progress
- Jul 16, 2010
- Software security expert Gary McGraw went to a White House meeting on cyber security attended by 100 public and private sector security experts. McGraw shares the details of the meeting, including an unannounced visit by President Obama.
|
- Software [In]security: Cyber War - Hype or Consequences?
- Jun 17, 2010
- Is the threat of cyber war real or imagined? In this article Gary McGraw first defines cyber war and then describes some very real possibilities.
|
- CCDC and the Tale of the Insider Threat
- May 24, 2010
- Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
|
- Five Applications to Secure Your Wi-Fi Hotspot Connections
- May 13, 2010
- Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
|
- Software [In]security: BSIMM2
- May 12, 2010
- Gary McGraw and colleagues discuss the latest iteration of the Building Security In Maturity Model, BSIMM2.
|
- Software [In]security: Assume Nothing
- Apr 30, 2010
- Software security expert Gary McGraw thinks Microsoft may be forgetting the old mantra of thinking like an attacker by deciding not to patch a vulnerability in the Virtual PC Hypervisor.
|
- The Bad Guys from Outside: Malware
- Apr 29, 2010
- In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
|
- Securing Your Wi-Fi Hotspot Sessions
- Mar 30, 2010
- Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
|
- Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
- Mar 26, 2010
- Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
|
- Software [In]security: What Works in Software Security
- Feb 26, 2010
- 15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
|
- Software [In]security: Cargo Cult Computer Security
- Jan 28, 2010
- Gary McGraw argues that the time is right to turn to real science to combat the "Cargo Cult" mentality of the software security field.
|
- Chained Exploits: How Hackers Combine Attacks to Hack You
- Jan 27, 2010
- Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
|
- Understanding the New A+ Security Objectives
- Jan 6, 2010
- Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
|
- Software [In]security: You Really Need a Software Security Group
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Top 4 Software Development Protection Techniques and How to Defeat Them
- Dec 7, 2009
- Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
|
- Exploiting phpMyadmin: How to Get root in 15 Easy Steps
- Nov 20, 2009
- Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
|
- Software [In]security: BSIMM Europe
- Nov 10, 2009
- Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
|
- Software [In]security: Startup Lessons
- Oct 22, 2009
- Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
|